The Coalition for Content Provenance and Authenticity ( C2PA) is tackling the issue of misleading information online by ...
A silly-season BLE connectivity story Overheat people’s smart ski socks …but only when in Bluetooth range AND when the owner’s phone is out of range of their feet! Having experienced painfully cold ...
“Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the chaos of a cybersecurity breach. Accept that you will get punched in the face Train ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
This represents how different teams can work; a collaboration wheel: Based on experience of attacker tactics and techniques as witnessed in our Incident Response division, our Red Team develops and ...
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
A red team engagement is an objective-based assessment that requires a holistic view of the organisation from the perspective of an adversary. This assessment process is designed to meet the needs of ...